Latest
Dropzone AI Cybersecurity Funding Reaches USD 16.85M
Zscaler ThreatLabz 2024 Phishing Report Flags AI's Role in Phishing
Red Hat Updates Trusted Software Supply Chain to Bolster Security
Wiz Inc. Acquisition Negotiations to Buy Lacework for USD 150M- USD 200M
Armis Inc. Acquires Silk Security Inc. in a Deal Worth USD 150 M
Vorlon Secures USD 15.7M to Address Third-party API Risks
Akamai to Acquire Noname Security Reportedly for USD 500 M
Cohesity Secures USD 150M from IBM Nvidia, Expands Partnership
Cohesity Secures USD 150M from IBM Nvidia, Expands Partnership
iPhone Mercenary Spyware Targets Users in 92 Countries
Login
Login
Insights
cloud
solutions
virtualization
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
News
cloud
solutions
virtualization
digital
digital marketing
social media marketing
Finance
mobility
sales
crm
security
tech
app management solutions
best practices
data center solutions
infra solutions
networking
storage
unified communication
Whitepapers
All
Security
endpoint best practices to block ransomware...
best practices for securing your network from rans...
security outcomes report volume 3: achieving secur...
hybrid firewall ck_toolkit_data center firewall...
analyst - gartner workload and network security hy...
use the 2023 mitre attck® evaluations results for...
automate security operations with the multilayered...
current security solutions and user training are n...
detendo adversários ativos...
detenga a los adversarios activos...
stopping active adversaries: lessons from the cybe...
guia da sophos para seguro de proteção digital...
guía de sophos sobre ciberseguros...
sb - simplify wired and wireless network security ...
industry insights – three ways fortinet hybrid m...
kmsat demo: new school security awareness training...
the real world: new-school security awareness trai...
critical considerations when choosing your securit...
2023 phishing by industry benchmarking...
state of email security report...
All
Security
what is cyber espionage? attacks jeopardizing busi...
menace of ping flood attacks: a growing network pe...
explore reasons & steps to stop social enginee...
a comprehensive guide on saas risk management...
why is operational technology cybersecurity essent...
what are web application firewalls (wafs)? robust ...
code injection attacks: a guide to security preve...
understanding dictionary attacks in the intersecti...
a guide to cybersecurity asset management...
understanding operational technology security risk...
the best cloud security trends in 2024...
guide on what is zoombombing and preventive measur...
decoding smurf attacks: the concept, mechanics, im...
your go-to security information and event manageme...
managed detection and response: a security imperat...
logic bombs unveiled: safeguarding businesses from...
exploring data center protection strategies...
decoding cross-site scripting (xss): navigating te...
the rise of self-defending networks...
the strategic role of deception technology in thre...
All
Security
dropzone ai cybersecurity funding reaches usd 16.8...
zscaler threatlabz 2024 phishing report flags ai's...
red hat updates trusted software supply chain to b...
wiz inc. acquisition negotiations to buy lacework ...
armis inc. acquires silk security inc. in a deal w...
vorlon secures usd 15.7m to address third-party ap...
akamai to acquire noname security reportedly for u...
cohesity secures usd 150m from ibm nvidia, expand...
cohesity secures usd 150m from ibm nvidia, expand...
iphone mercenary spyware targets users in 92 count...
descope’s new features streamline user onboardin...
sama launches sama red team for ai model’s secur...
cyera’s series c funding reels usd 300m...
darktrace plc’s ‘darktrace activeai security p...
microsoft’s unified security operations platform...
priva’s automation expansion service with five n...
tanium partnership with microsoft shares endpoint ...
zafran debuts with usd 30m fund to fast-track vul...
skyflow’s new funds to be used to enhance data p...
google’s new report reveals a rise in zero-day e...
All
Security
startup zero networks secures usd 20m...
new searchlight security module brings extra intel...
data privacy best practices every business should ...
Home
Page 3
Search Results for:
threats
Securing Endpoints Amid New Threats
Research Desk
Sep 16, 2022
Giving employees the flexibility to be fully productive while working remotely makes it critical that businesses have endpoint security measures in place to prevent, detect and respond to the growing ...
Perception Point Launches Advanced Browser Security to Eliminate Web Browser Threats
Insights Desk
Jul 25, 2022
Highlights The managed solution lets users browse the web or access SaaS applications without exposing enterprise data to risk. Customers of Perception Point also benefit from a fully managed ...
Homeland Security Warns – Log4j Threats will Persist for a Decade or More
Insights Desk
Jul 15, 2022
Highlights: Log4j attacks and vulnerabilities can persist for around a decade or longer. The report also makes recommendations on how organizations can address ongoing Log4j risks. Accordin...
Safeguard Your Infrastructure from Ransomware and Cyber Threats
Research Desk
Jun 08, 2022
This brief highlights Dell Technologies' methodologies, processes, and tools to implement cutting-edge security practices while governing compliance and industry standards....
Stay step ahead of cybersecurity threats in K-12
Research Desk
Apr 11, 2022
According to Consortium for School Networking (CoSN), cybersecurity and student data privacy are ranked as the top two priorities for school district IT leaders. Yet, district IT leaders generally und...
Cybersecurity: Combating Modern Threats with Graph Databases
Research Desk
Mar 14, 2022
Wednesday, March 30, 2022 7:30 a.m. - 10:30 a.m. PT | 15:30 - 18:30 BST “Defenders think in lists. Attackers think in graphs. As long as this is true, attackers win.” – John Lambert, Distingu...
Endace and LinkShadow Integration Offers Fast, Definitive Incident Response to Cybersecurity Threats
Insights Desk
Jan 17, 2022
Highlights – LinkShadow offers AI-based security tools to quickly detect anomalous behavior and take immediate action, thus preventing data loss. Through AI-powered User and Entity Behavior ...
2021 Endpoints Threats Trends — Cyber security threat trends: phishing, crypto top the list
Research Desk
Nov 23, 2021
In 2020, cyber criminals launched four types of endpoint threats responsible for 10X more than all others: Cryptomining, phishing, trojans, and ransomware. Criminals also launched highly coordinated, ...
2021 Endpoints Threats Trends Infographic — Cybersecurity threats: Top of the charts
Research Desk
Nov 23, 2021
Last year, cyber criminals used advanced, multi-stage attacks against businesses of all sizes, and four types were used 10X more than all the rest. For our Cybersecurity threats: Top of the charts inf...
Building Proactive Defenses Against Advanced OT Threats
Research Desk
Jun 17, 2021
Industries that utilize operational technology (OT) are under pressure to maintain the highest levels of uptime, availability, and safety. This includes critical infrastructure (e.g., hydroelectric da...
Posts navigation
Prev
1
2
3
4
…
93
Next
Whitepapers
News
Insights
Security
Security
Security